aws-secrets-manager

Aurora Serverless password rotation setup using CloudFormation (and Lambda rotation templates)

杀马特。学长 韩版系。学妹 提交于 2021-02-19 03:20:00
问题 AWS has Fully Configured and Ready-to-Use Rotation Support for some supported RDS engines, including Amazon Aurora (Serverless also?) I'm trying to setup the password rotation in my CloudFormation template using AWS::SecretsManager::RotationSchedule (note that this is not a fully functional template, only an illustration): DBCluster: Type: AWS::RDS::DBCluster Properties: Engine : aurora EngineMode : serverless EngineVersion : 5.6.10a Secret: Type: AWS::SecretsManager::Secret Properties:

AWS System Manager Parameter Store vs Secrets Manager vs Environment Variation in Lambda, when to use which

不打扰是莪最后的温柔 提交于 2021-02-09 18:02:37
问题 Encountered a few speicific use cases that I'm somewhat confused to use which: A large number of free, public API keys. Using lambda environment variable with encyption, other developer/admin can still expose their plaintext value right in the lambds console. Should Parameter Store be used instead? Login credentials to a third party platform. I assume that Secrets Manager is the only option? DB Connection strings. Secrets Manager? At $0.40/secret/month, the bill would add up for hundreds of

AWS System Manager Parameter Store vs Secrets Manager vs Environment Variation in Lambda, when to use which

核能气质少年 提交于 2021-02-09 18:01:39
问题 Encountered a few speicific use cases that I'm somewhat confused to use which: A large number of free, public API keys. Using lambda environment variable with encyption, other developer/admin can still expose their plaintext value right in the lambds console. Should Parameter Store be used instead? Login credentials to a third party platform. I assume that Secrets Manager is the only option? DB Connection strings. Secrets Manager? At $0.40/secret/month, the bill would add up for hundreds of

AWS System Manager Parameter Store vs Secrets Manager vs Environment Variation in Lambda, when to use which

只谈情不闲聊 提交于 2021-02-09 17:59:41
问题 Encountered a few speicific use cases that I'm somewhat confused to use which: A large number of free, public API keys. Using lambda environment variable with encyption, other developer/admin can still expose their plaintext value right in the lambds console. Should Parameter Store be used instead? Login credentials to a third party platform. I assume that Secrets Manager is the only option? DB Connection strings. Secrets Manager? At $0.40/secret/month, the bill would add up for hundreds of

AWS System Manager Parameter Store vs Secrets Manager vs Environment Variation in Lambda, when to use which

五迷三道 提交于 2021-02-09 17:59:37
问题 Encountered a few speicific use cases that I'm somewhat confused to use which: A large number of free, public API keys. Using lambda environment variable with encyption, other developer/admin can still expose their plaintext value right in the lambds console. Should Parameter Store be used instead? Login credentials to a third party platform. I assume that Secrets Manager is the only option? DB Connection strings. Secrets Manager? At $0.40/secret/month, the bill would add up for hundreds of

How to use new secret created by key rotation from AWS Secrets Manager

孤人 提交于 2021-02-04 07:36:25
问题 I have a Java application using MongoDB (or it could be any service like that). On start up, the app creates a singleton connection to database. To connect, I get the MongoDB from AWS Secrets Manager... and thus the application runs merrily ever after communicating with MongoDB. My question is: What happens when AWS Secrets Manager rotates keys? How does my app come to 'know' that secret has been rotated. Do I have to synchronize the timing between Secrets Manager and my app? e.g. rotation is

AWS secrets manager, 'A previous rotation isn’t complete' when rotating secrets

心已入冬 提交于 2020-11-30 11:04:26
问题 I've created a secret and updated it to have a lambda rotation function My secret looks like aws secretsmanager list-secret-version-ids --secret-id envir/username { "Versions": [ { "VersionId": "90179cd3-daa1-48e4-9fe5-dde0a4cf22e4", "VersionStages": [ "AWSPREVIOUS" ], "LastAccessedDate": 1524528000.0, "CreatedDate": 1524568488.358 }, { "VersionId": "60576823-5d98-4360-af53-7e1f909b88d0", "VersionStages": [ "AWSCURRENT" ], "LastAccessedDate": 1524528000.0, "CreatedDate": 1524568827.466 } ],